Featured Blog
When “Basic” Attacks Cause Massive Damage: What the Stryker Attack Really Shows
A reported 200,000 devices impacted. Manufacturing disruption. Shipping disruption. A major medical technology company struggling to operate. That is what made the Stryker attack worth paying attention to. Not because it introduced some dazzling new exploit chain, but because it appears to have followed a pattern security leaders should already recognize: privileged access, centralized administration, and too much […]
Cyberattacks, Vulnerabilities
Mass Exploitation 2.0: When One Vulnerability Becomes Everyone’s Problem
API security
OopsKey: Tom Pohl’s New Open-Source Tool Helps Security Teams Find Risky Google API Key Exposure
Data Breaches, News, vCISO
Treat Data Like Hazardous Material: Risks of Over-Collection and Retention
News, Tabletop Exercises